FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool

被引:2
作者
Aldwairi, Monther [1 ]
Alsaadi, Hesham H. [1 ]
机构
[1] Zayed Univ, Coll Technol Innovat, POB 144534, Abu Dhabi, U Arab Emirates
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17) | 2017年
关键词
Intrusion detection; intrusion prevention; log forensics; visualization; D3;
D O I
10.1145/3102304.3102337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The number of structured and unstructured logs datasets is increasing, and the complexity of analyzing threats from log files poses a challenge to the research community. We propose intelligent technique to visualize and extract threats from logs files using D3.js modules with standard RegEx API, called "FLUKES". In this paper we investigate the text-based ASCII format FTP, Snort, Apache and IIS server logs. When a content of a file type .json, .csv, .log, and .txt format is loaded into FLUKES, a representative summary is executed with least significant attack traces. FLUKES will formalize and generate a new signature pattern that eases the process of detection and analysis of threat anomalies in log files. Forensic investigators can then determine a set of certain fields relevant to the attack according to the corresponding target. We present an example investigation comparison based on FTP and Apache server logs collected and managed using Snort. The ultimate contribution is to forensically determine the summary of authentication (failed and successful) attempts to secure systems and traces found without altering the log evidence.
引用
收藏
页数:6
相关论文
共 25 条
  • [1] Aldwairi M., 2015, WEB APPL NETWORKING, P1
  • [2] Aldwairi M, 2011, J INF ASSUR SECUR, V6, P512
  • [3] Application of artificial bee colony for intrusion detection systems
    Aldwairi, Monther
    Khamayseh, Yaser
    Al-Masri, Mohammad
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2730 - 2740
  • [4] Visualizing web server attacks: patterns in PHPIDS logs
    Alsaleh, Mansour
    Alarifi, Abdulrahman
    Alqahtani, Abdullah
    Al-Salman, AbdulMalik
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 1991 - 2003
  • [5] [Anonymous], P 8 INT S VIS CYB SE
  • [6] [Anonymous], DAT FLOW MOD
  • [7] [Anonymous], 2012, NETW PROTOC ALGORITH
  • [8] [Anonymous], US GUID CISC SEC MAR
  • [9] [Anonymous], HDB DIGITAL FORENSCI
  • [10] [Anonymous], 2011, ANN INT C INF THEOR